In the third and final part of this series, we will explore Cerber, the most devious ransomware, and its behavior. Red Cerber:  The campaign of Red Cerber started in early 2017 after a small break. Developers of Cerber came up with a new and deadly version which had some improvements in its behavior. It noticeably changes […]

Read More →

Let’s continue from where we left off last week, and will go through the behavior patterns of the next versions of the Cerber Ransomware. Cerber3.0: Cerber3.0 RIG-V exploit kit is an updated version of Cerber2.0. After the release of Cerber2, security vendors released some decryptors to decrypt the files that were encrypted by the ransomware. […]

Read More →

Image Credit: Cybellum A 15-year-old Microsoft Windows Zero-Day vulnerability, dubbed as DoubleAgent, has been discovered. It could allow anyone to take full control of the system. It is a new code injection technique that works on all the versions of Microsoft Windows Operating Systems, even on the latest release of Windows 10. It can exploit […]

Read More →

Microsoft March 2017 Patch Tuesday brings 18 Security bulletins addressing 139 security vulnerabilities in addition to 7 vulnerabilities for Adobe Flash Player. Nine bulletins are rated as Critical, nine are rated as Important. The Nine Critical bulletins are as follows: MS17-006 for Internet Explorer browser covers 12 CVE’s MS17-007 for Microsoft Edge covers 32 CVE’s MS17-008 […]

Read More →

Adobe has released a critical security patch for Adobe Flash Player. The patch addresses seven (7) flaws including multiple code execution vulnerabilities. These flaws allow attackers to take complete control of the systems. The Linux and Mac operating systems are affected apart from Windows. Here are the details of the 7 vulnerabilities patched in APSB17-07 update: A […]

Read More →